提出 #396297: GitHub dingfanzu 1 SQL Injection情報

タイトルGitHub dingfanzu 1 SQL Injection
説明The reason for the SQL injection vulnerability is that the website application does not verify the validity of the data submitted by the user to the server (type, length, business parameter validity, etc.), and does not effectively filter the data input by the user with special characters , so that the user's input is directly brought into the database for execution, which exceeds the expected result of the original design of the SQL statement, resulting in a SQL injection dingfanzu-CMS does not filter the content correctly at the "chpwd.php" username module, resulting in the generation of SQL injection.
ソース⚠️ https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/dingfanzu-CMS/dingfanzu-CMS%20chpwd.php%20username%20SQL-inject.md
ユーザー
 fjjwebray.com.cn (UID 73871)
送信2024年08月22日 09:55 (2 年 ago)
モデレーション2024年08月29日 09:26 (7 days later)
ステータス承諾済み
VulDBエントリ276074 [dingfanzu CMS 迄 29d67d9044f6f93378e6eb6ff92272217ff7225c /ajax/chpwd.php ユーザー名 SQLインジェクション]
ポイント20

Interested in the pricing of exploits?

See the underground prices here!